Cyberattacks hit businesses every day. Ransomware is
especially problematic, with the number of successful
ransomware attacks increasing year-over-year. Cisco
Secure Endpoint protects against all cyberattacks with
cloud-delivered endpoint security with an integrated
platform approach across a breadth of critical...
Forrester's 24-criterion evaluation of endpoint security SaaS providers identified the 12 most significant ones and researched, analyzed, and scored them. See how Cisco Secure Endpoint measures up against the other providers to help security and risk professionals select the right one for their needs.
Spain's National Police Department says it has arrested eight members of an undisclosed cybercriminal gang over SIM swapping fraud. The suspects posed as trustworthy representatives of banks and other organizations and used phishing and smishing techniques to obtain PII and bank details of victims.
Ransomware attacks in 2021 amassed a record number of victims in critical infrastructure sectors across Australia, the U.K. and U.S., those countries' lead cybersecurity agencies warn. They share intelligence on attackers' latest tactics to better equip domestic organizations to defend themselves.
In order to keep pace with hackers, you need to learn like hackers. That’s why when it comes to guidance on building detection and response programs, MITRE ATT&CK® – which has a strong adversarial focus – trumps traditional frameworks such as the Diamond Model (which lacks technical depth), and Lockheed...
As networks become more diverse and complex, it becomes increasingly difficult for organizations to achieve consistent policy management and enforcement. Cisco's Firewall products can help solve these issues. Read "The Future of Firewalling: How a Platform Approach Can Lower Security Costs" to learn about: the...
Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
By identifying the 10 most common ATT&CK techniques used by adversaries, The Red Report by Picus Security helps security teams prioritize threat prevention and detection efforts. Its findings highlight the importance of a threat-centric approach and the need for organizations to continuously validate the effectiveness...
Workload security and firewalls should communicate to eliminate security gaps. Workload security offers deep contextual insight, and network security provides broad visibility. Discover how the combination of both can provide rapid detection and robust protection in our new white paper, Cisco Secure Workload and...
The ransomware landscape has changed a great deal over the past ten
years. Today, ransomware attacks are driven by three primary factors—
ransomware-as-a-service, extortion, and cryptocurrency—and each of
these variables influences the overall threat of ransomware in distinctly
different ways.
Download this...
A Kentucky hospital and the Maryland Department of Health are among healthcare sector entities still battling to fully recover from recent ransomware and other disruptive cyber incidents. What can other organizations do to avoid similar fates?
What are the "Four Horsemen of the Data Loss Apocalypse," and how are they causing challenges for organizations that have not yet transformed their approach to data security? Steven Grossenbacher and Jacob Serpa of Zscaler spell out a new, unified approach to enterprise data protection.
ThycoticCentrify renames itself Delinea to grow as a "seamless" security solution. Other acquisitions focus on providing tools to developers to better secure applications and software, boost healthcare device security, fight against chargeback fraud and bring smaller organizations into compliance.
Four ISMG editors discuss important cybersecurity issues, including misconceptions around Zero Trust implementation, lessons learned from the crippling NotPetya malware attack of 2017 that nearly sank logistics giant Maersk and how a Russian cyberwar in Ukraine could move beyond its borders.
Pharmaceutical giant Pfizer alleges in a federal lawsuit that two former executives stole documents containing trade secrets about diabetes, obesity and cancer treatments under development by the drugmaker to benefit two new biotech startups they had launched.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.